Vulnerabilites related to Unknown - Directorist – WordPress Business Directory Plugin with Classified Ads Listings
CVE-2022-2377 (GCVE-0-2022-2377)
Vulnerability from cvelistv5
Published
2022-08-22 15:02
Modified
2024-08-03 00:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Directorist WordPress plugin before 7.3.0 does not have authorisation and CSRF checks in an AJAX action, allowing any authenticated users to send arbitrary emails on behalf of the blog
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Directorist – WordPress Business Directory Plugin with Classified Ads Listings |
Version: 7.3.0 < 7.3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:09.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Directorist \u2013 WordPress Business Directory Plugin with Classified Ads Listings", "vendor": "Unknown", "versions": [ { "lessThan": "7.3.0", "status": "affected", "version": "7.3.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Krzysztof Zaj\u0105c" } ], "descriptions": [ { "lang": "en", "value": "The Directorist WordPress plugin before 7.3.0 does not have authorisation and CSRF checks in an AJAX action, allowing any authenticated users to send arbitrary emails on behalf of the blog" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-22T15:02:09", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530" } ], "source": { "discovery": "EXTERNAL" }, "title": "Directorist \u003c 7.3.0 - Subscriber+ Arbitrary E-mail Sending", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2377", "STATE": "PUBLIC", "TITLE": "Directorist \u003c 7.3.0 - Subscriber+ Arbitrary E-mail Sending" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Directorist \u2013 WordPress Business Directory Plugin with Classified Ads Listings", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.3.0", "version_value": "7.3.0" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Krzysztof Zaj\u0105c" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Directorist WordPress plugin before 7.3.0 does not have authorisation and CSRF checks in an AJAX action, allowing any authenticated users to send arbitrary emails on behalf of the blog" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] }, { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2377", "datePublished": "2022-08-22T15:02:09", "dateReserved": "2022-07-11T00:00:00", "dateUpdated": "2024-08-03T00:32:09.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-2046 (GCVE-0-2022-2046)
Vulnerability from cvelistv5
Published
2022-08-08 13:46
Modified
2024-08-03 00:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Directorist – WordPress Business Directory Plugin with Classified Ads Listings |
Version: 7.2.3 < 7.2.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:24:43.957Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1\u0026old=2731298\u0026old_path=%2Fdirectorist" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Directorist \u2013 WordPress Business Directory Plugin with Classified Ads Listings", "vendor": "Unknown", "versions": [ { "lessThan": "7.2.3", "status": "affected", "version": "7.2.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Rafie Muhammad" } ], "descriptions": [ { "lang": "en", "value": "The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-08T13:46:03", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1\u0026old=2731298\u0026old_path=%2Fdirectorist" } ], "source": { "discovery": "EXTERNAL" }, "title": "Directorist - Business Directory Plugin \u003c 7.2.3 - Admin+ Arbitrary File Upload", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2046", "STATE": "PUBLIC", "TITLE": "Directorist - Business Directory Plugin \u003c 7.2.3 - Admin+ Arbitrary File Upload" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Directorist \u2013 WordPress Business Directory Plugin with Classified Ads Listings", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.2.3", "version_value": "7.2.3" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Rafie Muhammad" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807" }, { "name": "https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1\u0026old=2731298\u0026old_path=%2Fdirectorist", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1\u0026old=2731298\u0026old_path=%2Fdirectorist" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2046", "datePublished": "2022-08-08T13:46:03", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T00:24:43.957Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-2376 (GCVE-0-2022-2376)
Vulnerability from cvelistv5
Published
2022-09-05 12:35
Modified
2024-08-03 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
The Directorist WordPress plugin before 7.3.1 discloses the email address of all users in an AJAX action available to both unauthenticated and any authenticated users
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Directorist – WordPress Business Directory Plugin with Classified Ads Listings |
Version: 7.3.1 < 7.3.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:09.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Directorist \u2013 WordPress Business Directory Plugin with Classified Ads Listings", "vendor": "Unknown", "versions": [ { "lessThan": "7.3.1", "status": "affected", "version": "7.3.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Krzysztof Zaj\u0105c" } ], "descriptions": [ { "lang": "en", "value": "The Directorist WordPress plugin before 7.3.1 discloses the email address of all users in an AJAX action available to both unauthenticated and any authenticated users" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-05T12:35:19", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad" } ], "source": { "discovery": "EXTERNAL" }, "title": "Directorist \u003c 7.3.1 - Unauthenticated Email Address Disclosure", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2376", "STATE": "PUBLIC", "TITLE": "Directorist \u003c 7.3.1 - Unauthenticated Email Address Disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Directorist \u2013 WordPress Business Directory Plugin with Classified Ads Listings", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.3.1", "version_value": "7.3.1" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Krzysztof Zaj\u0105c" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Directorist WordPress plugin before 7.3.1 discloses the email address of all users in an AJAX action available to both unauthenticated and any authenticated users" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2376", "datePublished": "2022-09-05T12:35:19", "dateReserved": "2022-07-11T00:00:00", "dateUpdated": "2024-08-03T00:32:09.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }